A Lightweight Graph-Based Model for Inter-networking Access Control

被引:0
|
作者
Kang, Zhongmiao [1 ]
Jiang, Wenting [1 ]
Chen, Yan [1 ]
机构
[1] Guangdong Power Grid Corp, Guangzhou 510000, Guangdong, Peoples R China
来源
关键词
Access control; Privilege management; Graph theory; Networking;
D O I
10.1007/978-3-030-00015-8_51
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In classic operation systems, processes are assigned different privileges according to the resources. The enforcement of privilege differentiation on diverse processes indicates that strict security management on the individual process, whose emphasis on the restriction on respective process, however, may also overlook the security risk among the processes. Specifically, one process can invoke another one and establish a session, during which the privileges of invoked process may be passed to the invoking process (e. g., by the inter-processes requests). Thus, it may result in the abuse of privilege and resource leakage. Moreover, the internetworking of the processes and their relations also complicate the tasks for the regulation on authorized privileges, and those can be obtained by inheritance. The management on the latter case (i. e., the inherited privileges) has not been well considered in the existing access control models, whose implementation also incur large overhead. In this paper, we propose a lightweight graph-based access control model to manage the privileges between the networked processes, which provides a general solution for the pervasive applicabilities such as process inter-invoking and network-based access control.
引用
收藏
页码:589 / 597
页数:9
相关论文
共 50 条
  • [1] Lico: A Lightweight Access Control Model for Inter-Networking Linkages
    Li, Simin
    Ren, Wei
    Zhu, Tianqing
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2018, 6 : 51748 - 51755
  • [2] Remote instrumentation access & control (RIAC) through inter-networking
    Wunnava, SV
    Hoo, P
    IEEE SOUTHEASTCON '99, PROCEEDINGS, 1999, : 116 - 121
  • [3] Graph-based specification of access control policies
    Koch, M
    Mancini, LV
    Parisi-Presicce, F
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2005, 71 (01) : 1 - 33
  • [4] Research of Graph-based Workflow Access Control
    Wei, Yonghe
    Shi, Chunjing
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 58 - 62
  • [5] Q-Learning-Based Inter-Networking Mobile Number Portability Congestion Control Mechanism
    Wang Anping
    Li Yuan
    Lin Lin
    CHINA COMMUNICATIONS, 2011, 8 (05) : 165 - 172
  • [6] Decidability of safety in graph-based models for access control
    Koch, M
    Mancini, LV
    Parisi-Presicce, F
    COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 229 - 243
  • [7] A graph-based framework for the analysis of access control policies
    Alves, Sandra
    Fernandez, Maribel
    THEORETICAL COMPUTER SCIENCE, 2017, 685 : 3 - 22
  • [8] Revisiting the Scene-Graph-as-Bus Concept: Inter-networking Heterogeneous Applications Using gITF Fragments
    Dhanjan, Jaspreet Singh
    Steed, Anthony
    2021 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS (VRW 2021), 2021, : 342 - 346
  • [9] Software-Defined Inter-networking: Enabling Coordinated QoS Control Across the Internet
    Petropoulos, George
    Sardis, Fragkiskos
    Spirou, Spiros
    Mahmoodi, Toktam
    2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2016,
  • [10] Inter-networking, VCSEL-based low-cost hybrid base stations towards the integration of wireless and wireline access networks
    Bakaul, Masuduzzaman
    Nadarajah, Nishaanthan
    Nirmalathas, Ampalavanapillai
    2007 INTERNATIONAL TOPICAL MEETING ON MICROWAVE PHOTONICS, 2007, : 41 - 44